0% found this document useful (0 votes)
13 views27 pages

Second Term Yr 9 Lesson Note

The document provides a comprehensive overview of spreadsheet packages, particularly focusing on Microsoft Excel, including definitions, features, and functionalities. It covers essential concepts such as worksheets, cells, formulas, and various operations like addition, subtraction, and creating graphs. Additionally, it outlines the steps for starting, saving, and editing worksheets, as well as the importance of using formulas for calculations.

Uploaded by

Grant Dimkpa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views27 pages

Second Term Yr 9 Lesson Note

The document provides a comprehensive overview of spreadsheet packages, particularly focusing on Microsoft Excel, including definitions, features, and functionalities. It covers essential concepts such as worksheets, cells, formulas, and various operations like addition, subtraction, and creating graphs. Additionally, it outlines the steps for starting, saving, and editing worksheets, as well as the importance of using formulas for calculations.

Uploaded by

Grant Dimkpa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

Second Term Lesson Note

Summary Note for Year 9, Week One: Spreadsheet Packages


SPREADSHEET
DEFINITION OF SPREADSHEET: A
spreadsheet is a collection of cells organized
into rows and columns where data is stored
and manipulated. The spreadsheet is known
as a worksheet. A spreadsheet begins with
row number one and column A. A cell is a
space in a worksheet formed by the
intersection of a row and a column. Each cell
can contain a number, text or formula. A cell
can also reference another cell in the same
worksheet, the same workbook or a different
workbook. Each cell has an address called
Cell Reference e.g. A1, B3, C7 etc. combination of more than one sheet is referred to as
workbook. The worksheets can accept thousands of rows of data and columns in the form of
fields. Active Cell is recognized by heavy border surrounding. It is the cell that is currently
worked upon.

CONTENT OF SPREADSHEET
When you are setting out a spreadsheet, you have to enter values, labels and formulas.
• VALUES: Values are those numbers you already know before starting the spreadsheet
operation. These values are inserted into cells of the spreadsheet.
• LABELS: Labels are words you enter to explain the values. You would not just enter a
list of numbers without explanation. Putting labels next to each of the numbers makes it
easier to check it through.
• FORMULA: Formulas are the mathematical equations you insert into the cells. Formulas are
commands that instruct the computer on what to do.

EVALUATION
1. Define a worksheet.
2. What do you understand by cell
reference?

USES OF SPREADSHEET
There are various uses of a spreadsheet. It uses varies according to the intended purpose.
Some of its uses are as follows:
1. Spreadsheets are used for administrative functions.
2. Spreadsheets are used for creating reports.
3. They are used for the preparation of daily sales.
4. They are used in computing school results.
5. They are used for project budgeting control.
6. They are used for drawing balance sheets.
7. Excel can store and calculate the data as directed using existing
data.
8. A spreadsheet can be used for analysis and decision making.
9. It makes calculations much easier than working things out yourself.

GENERAL SELF EVALUATION


1. State the uses of a spreadsheet.
2. Excel can be used to create analysis,
Explain.
3. What is an active cell?
4. What are the contents in a spreadsheet?

Summary Note for Year 9, Week Two: SPREADSHEET II


Topic: Spreadsheet Packages; Features and Terminologies, Loading and
Exiting Spreadsheet Packages

EXAMPLES OF SPREADSHEET
There are various types of spreadsheet software which
include:
• Microsoft excel
• Lotus 1-2-3,
• Starview,
• SuperCalc, etc.

MICROSOFT-EXCEL
Out of the many examples of spreadsheet
packages, Microsoft Excel is the most
commonly used because of its friendly
features. Microsoft Excel is part of
Microsoft suite. The suite comes in various
version such as 2000, 2005, 2007,2010,
2015 etc.
Ms-Excel is primarily used for analysis and
calculation due to its flexibility. It has a lot of calculating features and mathematical formulas.
Various kinds of mathematical calculations can be done using MS excel. Microsoft Excel is a
spreadsheet package used mainly for mathematical calculations and numerical analysis.
Examples of
calculations that can be performed using MS Excel include; addition, subtraction, multiplication,
division, average, etc.

Formulas are often used to carry out calculations in Ms-Excel. The desired formula for any
calculation must be preceded with an equal sign (=).

Spreadsheet Features and Terminologies


To fully understand and use a spreadsheet package, one must be used to some
terminologies. These terminologies include;

Row
Column
Cell
Active Cell
Worksheets
Workbook
Chart
Data Range
Fill handle
Moving
border

Rows
A Row is a horizontal line of cells which runs from left to right in a worksheet. They can be
identified by the numbers at the left-hand-side of the work sheet. They are numbered from 1, 2,
3 to 1,048,576 in Excel 2007, 2010, 2013 & 2016.

Columns
A Column is a vertical line of cells in a worksheet usually identified by letters across the top of
the sheet. There are about 16,384 columns in Excel 2007, 2010, 2013 & 2016.

Cells
A Cell
is the
interse
ction
of a
row
The
and aActive Cell
colum
The active cell is the cell that contains the cell pointer, while the active worksheet is
n. The
the worksheet where the cell pointer is currently located.
highlig
hted
rectan
gle on
Worksheet
the
cell is
the
The worksheet (also known as spreadsheet) is the working area of the package where entering of
data and calculations are handled. It consists of rows, columns, cells and a cell pointer where
data are actually entered and manipulated.

Workbook
This can be simply defined as a collection of worksheets. Each workbook contains
many worksheets just like a normal single book with a number of pages.

Chart
A Chart is a graphical representation of data that enables you to understand the data at a
glance. Examples of Charts include Column (histogram), Pie chart, Bar Chart, Line Chart,
Surface, Doughnut, etc.

Data Range
A group of highlighted cells in a worksheet is referred to as a Range.

Fill Handle
This is a small black square at the corner of selected cells. The cursor changes to a black
cross when moved to it.

Moving Border
This is an animated border that appears around a selected cell that has been cut or copied.
Press the ESC key to cancel a moving border.

STARTING MS EXCEL
Starting Worksheet (Using Microsoft Excel) Click the Start
button;
Click All Programs; Click Microsoft Office;
Click Microsoft Office Excel.

EVALUATION
1. Highlight the steps for starting Ms-Excel.
2. What are the types of calculations that can be performed in Ms-
Excel?

ARITHMETIC OPERATORS USED IN MS EXCEL


+ Addition – Subtraction
/ Division * Multiplication
^ Exponential

When creating a formula, you must know MS Excel’s order of operations. Certain operations are
performed before others. The term PEMDAS is the acronym to denote
MS Excel’s order of operation.
P —— Parenthesis (Bracket)
E —– Exponential
M —– Multiplication
D —– Division
A —– Addition
S —— Subtraction
Calculations enclosed in parenthesis are performed first, followed by calculations involving
exponentials. Multiplication and division operations are performed next because they are
considered equal in importance. They are performed in the order in which they are encountered
from left to right. Addition and subtraction are performed last in the order in which they are
encountered from left to right.

Formulas in MS Excel
Examples: Addition =C3+D3
Subtraction =C3-D3
Division =C3/D3
Multiplication =C3*D3
Average =AVERAGE(C4…C9)

GENERAL EVALUATION
1. In the right order, list the order of calculation operations in Excel.
2. Apart from MS-Excel, list two other types of Spreadsheet packages.
3. Write the full meaning of the acronyms PEMDAS.
4. List two formulas in Ms-Excel.

Summary Note for Year 9, Week Three: Worksheet: Starting Excel


Worksheet, Formatting Worksheet

TOPIC: WORKSHEET
Worksheet commonly refers to a sheet of paper with questions for
students and places to record answers. The term may also refer to
a single array of data in spreadsheet software or an informal piece
of paper that an accountant uses to record information.
A worksheet or sheet is a single page in a file created with an
electronic spreadsheet program such as Excel or Google
Spreadsheets. A worksheet is used to store, manipulate, and
display data. A worksheet is a collection of cells where you keep
and manipulate the data. By default, each Excel workbook
contains three worksheets.
Each worksheet is composed of a very large number of cells –
which are the basic storage unit for data in a file or workbook. The
cells are arranged in a grid pattern using rows and columns.
In Excel 2013:
There are
1,048,576 rows per worksheet;
There are
16,384 columns per worksheet;
By default, each new file contains only one worksheet;
The number of sheets per file is limited only by the amount of
memory available on the computer.
In earlier versions of Excel, the default number of worksheets per
file was three.
For Google Spreadsheets:
There is a maximum of 256 columns per sheet;
Each worksheet also has a name. TheBy default, the
maximum worksheets
number of cells are named Sheet1, Sheet2, Sheet3
for all
and so on.
worksheets in a file is 400,000;
The current default number of
worksheets for new files is one;
There is a maximum of 200 worksheets per spreadsheet file.

STARTING A WORKBOOK FILE


Workbooks are file that can be created in excel. You can start workbook any time you want
to create a new file for your excel data. Steps are
1. Open a new workbook in Excel
2. Point start on the screen of your monitor
3. Click on all programs
4. Point to Microsoft office tab
5. Select Microsoft excel (this will take you to the excel
environment)
CREATING EXCEL DOCUMENT
Once Excel is open, you can enter data into a file by clicking on a particular cell, then typing
text, numbers, or formulas. Your changes will be entered into the current cell.
Press the tab to enter your data and move the active cell to the right of the current one.
Press enter key to enter your data and move the active cell to the next row, usually to the
beginning of that row.
Use the arrow keys to enter your data and move the active cell in the indicated
direction.
Press the end key, right-arrow key to move to the last cell in a row.

ENTERING DATA IN A WORKSHEET


Locate the cell where you want to enter data on the worksheet and click on the cell. For
example point and click on cell A1.

Type in your entry from the keyboard and notice the appearance of the entries in the formula bar
with the cell address. Press ‘Enter’ key.

EVALUATION
1. What are the steps involved in creating a
Spreadsheet?
2. Explain how to enter data into Excel.

EDITING DATA IN A WORKSHEET


Wrong entries may either be entirely re-typed or the particular cell/range of cells can be
corrected.
To retype:
Move the cell pointer to the cell to be corrected or re-type the entry and press ‘Enter’
To correct only the mistake:
Move the cell pointer to the cell and double click on the cell. Make the correction by
inserting, deleting or retyping.
Press ‘Enter’.
SAVING A WORKSHEET
Saving for the first time:
Click on ‘Home’ button,
Click ‘Save As’ button and wait for a dialog box to open.
Type in your desire filename (i.e. the name of the document). Click the ‘Save’ button or press
enter on the keyboard.
Saving while working (after the first saving).
Click on the ‘save’ icon on the Quick Access toolbar or click on ‘office button’ to open the
menu. and click ‘save’ from the options.

RETRIEVING A SAVED WORKSHEET


Retrieving a worksheet means to open an already saved worksheet from its location in
the computer. This is usually done to view, edit or update the worksheet.
Load/start Microsoft Excel
Click on ‘Office Button’
Click the ‘Open’ option from the list and wait for a dialog box to open.

Navigate to the file you want to open and double click on it.

GENERAL EVALUATION
1. Define a cell.
2. State steps involved in saving a worksheet for the first
time.
3. Highlight the steps in retrieving a saved document.

Summary Note for Year 9, Week Four: Excel calculations


The basic and most powerful feature of Microsoft Excel is the ability to accept formula into the
worksheet. A Formula is an instruction that is entered to tell Excel how to Add, Subtract, Multiply,
Divide, or otherwise perform calculation by using the content of other cells. It is advisable to
construct formula that makes reference to cells in the worksheet so that the result can be
instantly generated even the values are changed.
When working on Excel calculations, the following guidelines should be considered;
To enter a formula, first select the cell that will contain the formula.
All formula must begin with equal (=) sign tells Excel to treat the cells contents as a formula.
The formula should not be more than 1024 characters.
The function name (e.g. SUM, AVERAGE) which is preceded by equal (=) sign must be selected
and followed by the desired argument, i.e. =SUM (A5:F5). In this case, SUM is the function
name and A5:F5 is the argument.

Addition: Using the SUM Function


The SUM function is used to add together a range of data or numbers. To sum up the values of
a range of data:
Open the worksheet containing data (as previously done in Fig. 2 in the previous lesson).
Position the cell pointer on the desired cell i.e. the cell where the result should be
displayed.
Type equal sign, Select the function (i.e. SUM) and state the range of cells.
MS Excel will highlight the range specified.
Press the Enter key.
The result is displayed.

Excel calculations – Addition: Using the SUM Function


Summing up a range of values

Subtraction: Using the IMSUB Function


The IMSUB function is used to find the difference of two numbers. To find the difference of a
range of data;
Open the worksheet containing data (as previously done in Fig. 2 in the previous lesson).
Position the cell pointer on the desired cell i.e. the cell where the result should be displayed.
Type equal sign, Select the function (i.e. IMSUB) and state the range of cells, usually two
cells.
MS Excel will highlight the range specified.
Press the Enter key.
The result is displayed.

Average
It is also possible to use the spreadsheet package to find the average of certain values or
group of numbers. To find average:
Position the cell pointer in the desired cell where result is to be displayed
Type “=AVERAGE (DATA RANGE)”in the formula bar
Press the ENTER KEY
The result is displayed in the cell

Count
The COUNT function is used to ascertain the number of cells within a specified range
that contains values. To use the count function;
Position the cell pointer in the desired cell
Click on AutoSum (S) and select “Count”
Press the ENTER KEY.

Multiplication
The multiplication function is solely for multiplication of numbers just like in arithmetic. To
multiply a range of data;
Position the cell pointer on the desired cell i.e. the cell where the result should be
displayed.
Type equal sign, Select the function (i.e. PRODUCT) and state the range of cells.
MS Excel will highlight the range specified.
Press the Enter key.
The result is displayed.
Also, the symbol (*) can be used.
Division
To divide a range of values;
Position the cell pointer on the desired cell i.e. the cell where the result should be displayed.
Type equal sign, Select the function (i.e. QUOTIENT to display the integer portion of a
division) and state the range of cells.
MS Excel will highlight the range specified.
Press the Enter key.
The result is displayed.
Also, the symbol (/) can be used to display the exact result.

Printing of Worksheet
After the spreadsheet have been formatted and properly calculated the next thing is to get
the worksheet printed. To print your worksheet, take the following steps:
Highlight the range to be printed
Click on the Office button and select Print
Select the name of the printer from the Printer Name box
Enter the number of copies to print
Click on Preview button and select Page Set Up. Set all the necessary parameters like
margins, page layout, paper size and grid lines (if necessary).
Click on OK
Click on

EVALUATION
State THREE guidelines that must be followed when performing excel calculations
Highlight the major steps required to carry out the following calculations: (a) Addition
(b)
Subtraction (c) Count (d) Average (e) Division

Summary Note for Year 9, Week Five: Creative and Editing Graphs
A graph is a diagram showing the relationship that exist among variables, quantities (varies
data), usually of two, each measured along one of a pair of axes at right angles. It may not be
possible
to plot a graph without value. The excel spreadsheet provides the values that are plotted.

Creating a Graph
Charts are used to display a series of numeric data in a graphical format to make it easier
to understand large quantities of data and the relationship between different series of data.
To create a chart in Excel, you start by entering the numeric data for the chart on a
worksheet. Then you can plot that data into a chart by selecting the chart type that you
want to use on the Insert tab, in the Charts group.
1. Worksheet data
2. Chart created from worksheet data

Excel supports many types of charts to help you display data in ways that are meaningful to your
audience. When you create a chart or change an existing chart, you can select from a variety of
chart types (such as a column chart or a pie chart) and their subtypes (such as a stacked
column chart or a pie in the 3-D chart). You can also create a combination chart by using more
than one
chart type in your chart.

Example of a combination chart that uses a column and line chart type.
Types of Chart
Line graph
Histograms
Pie-charts
Legends
Line Graph
Line graphs are often used to plot changes in data over time, such as monthly temperature
changes or daily changes in stock market prices. Line graphs have a vertical axis and a
horizontal axis. If you are plotting changes in data over time, time is plotted along the horizontal
or x-axis
and your other data, such as rainfall amounts is plotted as individual points along the vertical or
y- axis.

Histograms
A histogram
consists of
tabular
frequencies,
shown as
Pie Charts and Legends
adjacent
rectangles,
erected over
Pie Charts
discrete
intervals
Pie charts,(bins),
or circle graphs as they are sometimes known, are a little different from the other two
with
types ofangraphs
areadiscussed.
equal to the
For one, pie charts do not use horizontal and vertical axes to plot points like the others. They
frequency of
also differ in that they are used to chart only one variable at a time. As a result, it can only be
the
used to show percentages. The circle of pie charts represents 100%. The circle is subdivided
observations in
into slices representing data values. The size of each slice shows what part of the 100% it
the interval.
represents.
The height of a
Legends
rectangle is
A legend
also is used
equal to to identify each series in a chart. It contains on sample of the marker colour and
patternfrequency
the of each series.
density
Modify a ofbasicthechart to meet your needs
interval.
After you create a chart, you can modify any one of its elements. For example, you might want
to change the way that axes are displayed, add a chart title, move or hide the legend, or display
additional chart elements. To modify a chart, you can do one or more of the following:

Change the display of chart axes: You can specify the scale of axes and adjust the interval
between the values or categories that are displayed. To make your chart easier to read, you can
also add tick marks to an axis, and specify the interval at which they will appear.
Add titles and data labels to a chart: To help clarify the information that appears in your chart,
you can add a chart title, axis titles, and data labels.
Add a legend or data table: You can show or hide a legend, change its location, or modify the
legend entries. In some charts, you can also show a data table that displays the legend keys
and the values that are presented in the chart.
Apply special options for each chart type: Special lines (such as high-low lines and trend lines),
bars (such as up- down bars and error bars), data markers, and other options are available for
different chart types.

EVALUATION
1. State the steps to modify a chart
Summary Note for Year 9, Week Six: Formatting graphs
After creating a chart, you can change it to the type you want. The type you choose depends on
how you want to present your data.

Select the chart


Within the chart, click the right mouse button OR
Click on insert on menu bar
Click on change Chart type
Under Chart Type, list click to select the desired chart type (e.g, Column, Bar, Line, etc). Under
Chart sub-type list, click to select the chart sub-typed desired. You can view the chart sample
by pressing it and hold to view sample button.
Click on OK when satisfied.

Formatting graphs – Changing chart type


Changing from histogram to pie chart using the same
data
Formatting graphs – Changing chart type – Changing from histogram to pie chart using the same
data

Adding and Editing Charts


Once you have created a chart, you can add more chart data series or copy additional chart
data series from a worksheet or another chart. Microsoft Excel offers a variety of ways to edit
your chart data

You can change a chart data series by:

Adding a chart data series to a chart

Adding or removing more data point to the existing chart data series.

Plotting the data by rows or by columns.

To add or edit a chart data series with chart wizard tool

Select the chart you want to edit

Click the chart wizard tool

Follow the instruction on the screen

The chart is automatically updated to reflect the new data.

Formatting graphs – Adding and editing charts

Adding more data to the present data gives us


Formatting graphs – Adding and editing charts

Formatting a Chart

You can change the font of chart text, change the horizontal and vertical alignment and rotate text
to a vertical orientation. You can also change the pattern and the colour of the text area. The text
is displayed in the front of the area pattern so that it is always visible. Microsoft Excel
automatically formats the charts title and axes title as bold.

To format chart text with the standard tool bar

To format all the text in a chart, select the chart by choosing select chart from the chart menu. To
format a single piece of attached or unattached text, click the text to select it. To format tick-
mark labels for an axis, click the axis to select it.

To format text that appears in a legend, click the legend; click the legend to select it.

Click one of the formatting or alignment tools to format the text

Summary Note for Year 9, Week Seven: Hacking


Who is a hacker?
In the computer security context, a
hacker is someone who seeks and
exploits weaknesses in a computer
system or computer network.
Hackers may be motivated by a
multitude of reasons, such as profit,
protest, challenge, enjoyment, or to
evaluate those weaknesses to
assist in removing them. The
subculture that has evolved around hackers is often referred to as the computer
underground and is now a known community.
Hacking is usually a technical activity, although that does not necessarily mean that attackers
are always technically capable. Most of the attackers are script kiddies, who know just about
enough in order to use other (more competent) hackers’ work. That fact aside, it is necessary to
know the technical side of hacking, in order to understand the kind of knowledge that some
attackers have. This section provides a brief explanation of how to get into a target system and
how to exploit this as a full-scale hacking activity.

CRACKING COMPUTER SYSTEMS


There are many ways for attackers to obtain illicit access to computer systems. This kind of
access is often called “intrusion”, and the first thing an intruder does is usually trying to obtain
special/administrative privileges (root access) on that system. Having root access is very
important for the attackers since this means that they can do whatever they want on the
system, including covering their tracks, strengthening their hold and doing damage.

In general, there are three main ways to intrude into a system:

Physical Intrusion: This kind of intrusion happens when an intruder has physical access to the
target machine. This might allow the intruder to gain full control of the system – for example
by booting with a special floppy or by taking the system apart physically (e.g. removing the
Hard- drive to another system owned by the attacker, which then enables him/her to
read/write to it).
System Intrusion: In this case, it is assumed that the intruder has already got low-level privileges
on the system. They then exploit unpatched security vulnerabilities in order to escalate their
privileges to the administrative level.

Remote Intrusion: With remote intrusion, an attacker tries to get into the system remotely through
the network. They initially do not have any privileges to the system, but one way or another –
e.g. by finding out some valid account names and cracking their (usually weak) password, or by
exploiting common security vulnerabilities (buffer overflow, etc.) – they manage to get in and
obtain root access.

Remote intrusion is the most common type of attack associated with hackers. Nevertheless,
there are some cases of system intrusion, for example, the insider attack, where a
legitimate user (could be a disgruntled or former employee) performs an attack due to
various reasons (revenge, cyber-espionage, etc.).

In order to minimize intrusion, many organizations install Intrusion Detection Systems (IDS).
Such a system inspects inbound and outbound network activity and identifies suspicious
patterns that may indicate a network or system attack from someone attempting to break into or
compromise a system. There are many IDSs available. Most of these are commercial software
and are primarily concerned with remote intrusions. We will not discuss IDS in great detail in this
paper since our focus is on the attackers along with their hacking activities and some insights
into their human aspects.

TYPES OF ATTACKS
Attackers can cause various levels of damage, depending on their skill level and/or their
motives. There is a common pattern though: they usually follow a similar set of steps of
information gathering before launching the attack.
Foot Printing: The aim of this activity is to obtain a complete profile of the target organization’s
network and its security arrangement. The information of interest includes the technology that
the organization is using (e.g. Internet, Intranet, Remote Access, and Extranet) and its security
policies and procedures. Although there are many different methods attackers can use to
perform footprinting, there are four general steps that they are likely to follow: − Determine the
scope of the footprinting activities. In some cases, it might be a bit too much to determine all
entities associated with a Target organization. Therefore attackers often need to narrow down
the scope of their Footprinting activities.

Social Engineering: Social Engineering is the term used to describe cracking techniques that
rely
on weaknesses in wetware (i.e. human users attached to the system – administrators,
operators, etc.) rather than software. The aim is to trick people into revealing passwords or other
information that compromises a target system’s security.
Software Bugs: Another way to get into a system is through security vulnerabilities brought by
bugs in the software (operating system, server daemons, client applications, etc.). It is almost
impossible to have bug-free software and the attackers only need to find one hole in order to
break in. As a result, the program may crash and very often; this gives the attackers root
access and/or allows them to run any arbitrary code. Attackers can find buffer overflow bugs
by:
1. browsing the web for known buffer overflow vulnerabilities on certain programs;
2. Searching for these bugs in the program directly if the source code is available;
3. Examining every place the program prompts for input and trying to overflow it with random
(massive) data. If the program crashes, there is a chance that by carefully constructing the
input, access to the system can be obtained.

EVALUATION
1. Briefly explain the 3 main ways to intrude into a
system
2. State the types of attacks

Summary Note for Year 9, Week Eight: Logic Circuit


LOGIC CIRCUIT
A logic gate is
an elementary
building block of
a digital circuit.
Most logic gates
have two inputs
and one output.
At any given
moment, every
terminal is in one
of the two binary
conditions low
(0) or high (1),
represented by
different voltage
levels. The logic
AND GATE
The AND gate is so named because, if 0 is called “false” and 1 is called “true,” the gate acts in
the same way as the logical “and” operator. The following illustration and table show the circuit
symbol and logic combinations for an AND gate. (In the symbol, the input terminals are at left and
the output terminal is at right.) The output is “true” when both inputs are “true.” Otherwise, the
output is “false.”

OR GATE
The OR gate gets its name from the fact that it behaves after the fashion of the logical inclusive
“or.” The output is “true” if either or both of the inputs are “true.” If both inputs are “false,” then
the output is “false.”

XOR GATE
The XOR (exclusive-OR ) gate acts in the same way as the logical “either/or.” The output is
“true” if either, but not both, of the inputs, are “true.” The output is “false” if both inputs are “false”
or if both inputs are “true.” Another way of looking at this circuit is to observe that the output is 1
if the inputs are different, but 0 if the inputs are the same.

Inverter or NOT Gate


A logical inverter, sometimes called a NOT gate to differentiate it from other types of
electronic inverter devices, has only one input. It reverses the logic state.

NAND GATE
The NAND gate operates as an AND gate followed by a NOT gate. It acts in the manner of
the logical operation “and” followed by negation. The output is “false” if both inputs are “true.”
Otherwise, the output is “true.”
NOR GATE
The NOR gate is a combination OR gate followed by an inverter. Its output is “true” if both
inputs
are “false.” Otherwise, the output is “false.”

XNOR Gate
The XNOR gate is a combination inverter / NOT gate followed by an XOR gate. Its output is
“true”
if both inputs are “false.” Otherwise, the output is “false.”

Using combinations of logic gates, complex operations can be performed. In theory, there is no
limit to the number of gates that can be arrayed together in a single device. But in practice,
there is a limit to the number of gates that can be packed into a given physical space. Arrays of
logic gates are found in digital integrated circuits (ICs). As IC technology advances, the required
physical volume for each individual logic gate decreases and digital devices of the same or
smaller size become capable of performing ever-more-complicated operations at ever-
increasing speeds.

Uses of standard Logic Circuit


1. Logic gates are building blocks of hardware electronic
components.
2. It is used in the activation of doorbells.
3. The AND gates use to combine multiply signals
4. The NOT gate is used in building a switch.
EVALUATION
State the uses of standard Logic Circuit
Mention four types of gate
Draw the symbol of any four logic gate
Construction the truth table of AND, OR, NOR, NAND gate
Write the boolean expression of AND, OR, NOR, NAND gate

Summary Note for Year 9, Week Nine: Computer Career Opportunities


CAREERS IN COMPUTER
INDUSTRY
Now a day’s computer industry is the
largest industry where jobs are created
for thousands of people and primary
business people and primary
businesses which are computer-related
jobs.
Computers have become a ubiquitous
part of modern life, and new
applications are introduced every day.
The use of computer technologies is also commonplace in all types of organizations, in
academia, research, industry, government, private and business organizations. As computers
become even more pervasive, the potential for computer-related careers will continue to grow
and the career paths in computer-related fields will become more diverse.
The career opportunities for computer science graduates can be classified into different
categories. Examples are:
1. General business and IT development
2. Computer equipment field
3. Computer software field
4. Computer service and repair filed
5. Computer sales
6. Computer education and training field
7. IT consultation
8. Programming and Software Development.
9. Information Systems Operation and Management.
10. Telecommunications and Networking.
11. Computer Science Research.
12. Web and Internet.
13. Graphics and Multimedia.
14. Training and Support.
15. Computer Industry Specialists.
Programming and Software Development
1. Systems analyst – Determines an organization’s needs and designs programs to meet them.
Acts as a problem solver who specialize in how information flows from information sources to
computers. Supervises lower-level programmers.
2. Systems consultant – Works under contract to install or configure hardware or software,
write or customize programs, or otherwise help solve information processing problems for an
organization. Business-related courses are helpful.
3. Software engineer – Designs and writes complex computer programs as part of a software
development team. Applies principles of computer science to solve practical problems.
4. Systems programmer – Designs and writes programs that interface with a computer’s low-level
operating system, such as device drivers and utilities.
5. Database analyst – Designs and creates programs used to collect, maintain, and analyze data
needed by the business, government, or other institutions. Adapts programs to changing
business needs.
6. Artificial Intelligence programmer – Applies principles of artificial intelligence to design and
implement systems that perform complex tasks. Applications include expert systems that apply
rules to make decisions, such as scheduling freight shipments or diagnosing disease; pattern
recognition systems that give robots the ability to see and understand objects in their
environment; neural network programs that can learn to perform tasks by constantly re-
evaluating their performance.
7. Scientific applications programmer – Works closely with scientists and engineers to write
programs that simulate natural phenomena or analyze experimental results, or apply scientific or
engineering principles to research or manufacturing.
8. User interface designer – Designs the menus, icons, and other features that people will use
to interact with a computer program or operating system. Needs to have empathy with computer
users and artistic sense of composition.
9. Embedded systems application programmer – Designs and develops applications
for appliances and entertainment products such as PDA, mobile phone, mp3 player.

Information Systems Operation and Management


Electronic data processing (EDP) auditor- Closely examines data processing operations to guard
against loss through mistakes, carelessness, or fraud. Often work in banks, insurance
companies, accounting firms, and other organizations that use a large amount of financial data.

Database administrator – Takes overall responsibility for the usage, accuracy, efficiency,
security, maintenance of an organization’s database systems. Coordinates development
and
use of data resources.
Systems administrator – Responsible for managing the operation of a multi-user computer
system or network so that it runs reliably and meets user’s needs; updates and configures
software and hardware; provides assistance to users and managers.

Computer security specialist – Protects computer systems from illegal intrusions, viruses, data
theft, fraud, or other forms of tampering.
Management/IT consultants – Uses problem-solving skills and computer knowledge to solve
business and management problems for organizations and foster improvement in areas such as
organization structure, business communication, and productivity. Defines and analyzes the
problem, interviews potential employees, develops possible solutions and presents options to the
client.

Information systems manager – Oversees all operations in an organization’s information system


department, including technical support, training, network, and database operations. Ensures
that everyone in the organization has timely, reliable access to the computer system and its
databases and other resources.

Chief information officer (CIO) – Serves as the highest information services executive for a major
corporation. Responsible for long-term planning and setting organization-wide policy and
standards relating to all computer-related activities.

Telecommunications and Networking


Network engineer/consultant
Plans for the installation or expansion of local or wide-area computer networks. Performs
complex configuration of servers, hubs, routers, and other network communications equipment.
Writes scripts or programs to automate network operations.

Network administrator
Takes overall responsibility for the operation and planning for a local or wide-area
computer network. Plans expansion; selects appropriate network operating system and
software tools; configures major features; deals with the connection between local network
and Internet; establish procedures for support staff and users.

Computer Science Research


Computer scientist/researcher
Applies theoretical expertise to complex problems and develop innovative ideas necessary for
the application or creation of new technology. They usually work in research labs or academic
institutions.

Computer science professor


He / She teaches college courses in computer science theory, performs research and
supervises student research. May serve as a consultant to government or business.

Artificial Intelligence researcher


Develops programs to imitate the thinking and reasoning processes of the human brain;
for example, recognize voices and objects, speak in a humanlike voice.
Data miner
Analyzes databases in business, government, or scientific applications in order to extract
additional information or find useful patterns. Needs familiarity with major database and
statistical packages.

Web and Internet


Internet applications programmer
Develops programs that add features such as forms and animation to Web sites or that
provide tools to help users get the most out of the Internet.

Internet consultant
Uses some combination of analysis, design, programming, and support skills to help clients
with the design of Internet sites and configuration of Internet software and connections.

Webmaster
Creates or
maintains a
Web site.
Provides
content and
programming or
Graphics and Multimedia
supervises
writers and
programmers.
Animation/Special
Monitors the effects developer
Develops software programs for creating sequences of computer images for games or
performance
movies.
and popularity
of the site.
Provides secure
Multimedia
forms anddeveloper
transactions
Uses for programming skills to create interactive multimedia products that
design and
Internet-based
combine sound, images, and text.
businesses.

Computer game designer/programmer


Designs or writes computer games or game engines. Develop algorithms that make
the characters realistic and intelligent.
Technical writer
Writes instructional guides and other materials that explain how to use computer systems,
software, operating systems, or programming tools. Researches and writes reviews and
feature articles suited to specific reader profiles.

CERTIFICATE: This is the process of verifying the technical knowledge of an individual who has
demonstrated competence in a particular area, today there are more than 200 certificates
available, such as.

1. MICROSOFT CERTIFIED APPLICATION SPECIALIST


2. MICROSOFT CERTIFIED APPLICATION PROFESSIONAL
3. MICROSOFT CERTIFIED DESKTOP TECHNICIANS and so many more.

EVALUATION
1. Briefly explain the career opportunities of computer science
graduates

Summary Note for Year 9, Week Ten: Qualities of Good Computer


Professional
Computer professionals are information technology experts. The definition has extended to
those involved in the internet industry too, those who deal with the computer industry to develop
something. They may design, build, write or sell software. A computer professional is a person
who works in the field of

A computer professional may be:


1. A person working in the field of information technology
2. A person who has undergone training in a computer-related field college, universities and
computer institutes
3. A person who has extensive knowledge in the area of computing.
Some of the qualities needed to be most successful in the computer and IT world include
the following:

1. Excellent Analytical Skills


Great computer professionals have excellent analytical skills that can be applied to solve
problems or develop new ideas.
2. Versatility
A computer professional must be versatile, it is a necessary requirement needed by a
professional who wants to be successful. The most successful computer professionals will be
the ones who have skills that extend beyond information technology, such as skills in business
and finance.
3. Commitment to Learning
Technology is constantly changing, and those who keep abreast of the latest developments in
information technology are the ones who will be the most successful. Knowledge and keeping
up with the latest trends is the key to success; there is no single person who knows everything.
4. Good Knowledge of Math
Strong mathematical skills are necessary because math is used in many computer applications,
such as when dealing with circuits or programming.
5. The Ability to Learn & Memorize Programming Languages
Computer professionals must know many programming languages and how to use a wide
variety of computer software programs. A great memory helps keep work efficient. There is a
wide range of programming languages that are widely used for coding and writing programs, so
memorizing all of them is what a decent specialist should be able to do.
6. Good Communication Skills
The soft skills of verbal and written communication are increasingly important as non-techies rely
on technological
tools for their everyday business. Understanding a client’s needs and the ability to meet those
needs depend heavily on a steady stream of open communication. Those who are not familiar
with technology can be confused when the computer technology specialist uses a lot of
industry register, so you have to be able to switch between work speech and casual speech
quickly.
7. Attention to Detail
The slightest mistake can affect how a web page looks or how a program runs. Computer
personnel must pay close attention to detail to ensure everything works correctly and efficiently.
8. Multitasking Ability
People working with computers are often involved in many tasks at once and must be able
to manage all of their responsibilities simultaneously. Time management skills and an ability
to prioritize are assets as well.
9. Solid Problem Solving/Troubleshooting Capabilities
Computer professionals are called upon to solve problems with networks, software, and other
programs. They are expected to solve these problems very quickly, and having sharp
troubleshooting skills most definitely is a benefit.
10. Technical Writing Skills
Technical writing skills help a computer-savvy person explain complex concepts to those who
have limited knowledge of the computer world.

QUALITIES OF A GOOD COMPUTER PROFESSIONAL


COMPUTER MANAGER
Must have ability to control, coordinate and manage things.
High level of Computer literacy.
Versatility in the field of Computer
Good decision-maker when it comes to computer-related issues
COMPUTER SCIENTIST
Good knowledge of a Computer
Ability to repair and maintain a computer
Must be able to identify good computers

COMPUTER ENGINEER/HARDWARE ENGINEER


Excellent knowledge of Computer repair
Computer parts assemblage
Should be able to build at least a circuit board.

PROGRAMMER/SOFTWARE ENGINEER
Good computer programmer must be able to give instruction to the
computer.
Use of computer programming language to develop programs.
Ability to develop a good and durable program.
Must be able to detect or debug a problem in a program.

COMPUTER INSTRUCTOR/EDUCATOR
Teaches and trains people on the use, misuse and care of computer
Impacts knowledge into computer illiterates
Good knowledge of computer and effective operation

COMPUTER TECHNICIANS
Good computer technician repairs computer
Assembles computer parts
Troubles shooting of Computer problems
Computer hardware maintenance and repair

COMPUTER ANALYST/ SYSTEM ANALYST


Ability to analyze data
Train people on computer usage
Solve computer problems.
Computer setup in workplaces and schools
NETWORKING ENGINEER
Computer networking
Troubleshooting of faulty
networks
Network configuration.
Internet networking.
Network update knowledge

COMPUTER OPERATOR
Fast typing skills.
Use of graphics package for design
Excellent use of computer for
documents
The effective operation of the Computer

EVALUATION
1. State some of the qualities needed to be most successful in the computer and IT
world
2. State general qualities of a good Computer Professional

You might also like